| Information Systems and Technology, this could mean an incident that completely destroys data, slows down productivity, or causes any other major interruption to your operations or your business. How bad can it get?—"Most large companies spend between 2% and 4% of their IT budget on disaster recovery planning; this is intended to avoid larger losses. Of companies that had a major loss of computerized data, 43% never reopen, 51% close within two years, and only 6% will survive long-term." Hoffer, Jim." Backing Up Business - Industry Trend or Event.
Active Directory (AD) is a great system but it is also very delicate. If you encounter a problem, you will need to know how to recover from it as quickly and completely as possible. You will need to know about Disaster Recovery and be prepared with a business continuity plan. If Active Directory is a part of the backbone of your network and infrastructure, the guide to bring it back online in case of an incident needs to be as clear and concise as possible. If it happens or if you want to avoid all of this happening, this is the book for you.
Recovering Active Directory from any kind of disaster is trickier than most people think. If you do not understand the processes associated with recovery, you can cause more damage than you fix.
This is why you need this book. This book has a unique approach - the first half of the book focuses on planning and shows you how to configure your AD to be resilient. The second half of the book is response-focused and is meant as a reference where we discuss different disaster scenarios and how to recover from them. We follow a Symptom-Cause- Recovery approach – so all you have to do is follow along and get back on track.
This book describes the most common disaster scenarios and how to properly recover your infrastructure from them. It contains commands and steps for each process, and also contains information on how to plan for disaster and how to leverage technologies in your favour in the event of a disaster. |
|
|
Mobile Malware Attacks and DefenseThe Only Book for Analyzing and Mitigating Mobile Malicious Code!
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new... | | | | Beginning Fedora: From Novice to ProfessionalLinux has come a long way in a short time. Computing itself is still relatively young by any standard; if the era of modern computing started with the invention of the microchip, it’s still less than 50 years old. But Linux is a youngster compared even to this; it has been around for only 16 of those years.
In that brief time span,... |
|